US20040111380A2 - Method, according to which a customer accesses monetary-value data from a charging point - Google Patents

Method, according to which a customer accesses monetary-value data from a charging point Download PDF

Info

Publication number
US20040111380A2
US20040111380A2 US10/258,226 US25822602A US2004111380A2 US 20040111380 A2 US20040111380 A2 US 20040111380A2 US 25822602 A US25822602 A US 25822602A US 2004111380 A2 US2004111380 A2 US 2004111380A2
Authority
US
United States
Prior art keywords
character string
customer
crypto
data
payment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/258,226
Other languages
English (en)
Other versions
US20030135473A1 (en
Inventor
Jurgen Lang
Bernd Meyer
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of US20030135473A1 publication Critical patent/US20030135473A1/en
Publication of US20040111380A2 publication Critical patent/US20040111380A2/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/085Payment architectures involving remote charge determination or related payment systems
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing

Definitions

  • the invention relates to a method according to which a customer accesses monetary-value data from a loading station.
  • this objective is achieved in that a random number and a payment identification number containing data about the customer are generated in the loading station.
  • FIG. 1 shows a schematic diagram of process steps that can be advantageously integrated into a security architecture of the payment transaction.
  • the invention relates especially to the production of PayMarks, that is to say, monetary-value crypto-information.
  • PCF PayMark is an expansion of PC franking (PCF). With a few additions to the system, it is possible to generate so-called PayMarks, that is to say, monetary-value crypto-information, instead of postage indicia. These PayMarks can be submitted, for example, in electronic form within the scope of the e-Commerce Center, but also in another form (for example, paper) to a seller as payment for a purchase transaction. The seller can have the validity of these monetary-value PayMarks verified in an e-Commerce Center and then receives the corresponding value reimbursed from this e-commerce center.
  • PCF PayMark The security architecture of PCF PayMark is configured as follows:
  • the process shown involves a cyclic process which, depending on whether it is a credit or debit procedure of PCP, is executed regularly or irregularly for reloading debit amounts.
  • the actual start of the cyclic process is the stop that is designated with no. 16 in the figure, namely, the authentication of the customer system vis-à-vis a central "loading station".
  • the cyclic process only starts with the first process step after the authentication has taken place;
  • a random number X and a so-called Pay ID PID containing information about the customer, about his/her creditworthiness for micropayment purchases and about the period of validity of the PID are generated in the loading station
  • the random number X and the Pay ID PID are encrypted (e.g. symmetrically) to form a so-called "CryptoString" in such a way that only the e-Commerce Center is capable of decrypting the random number and the PID on the basis of this CryptoString.
  • the random number X, Pay ID PID and the CryptoString are encrypted in such a way (e.g. asymmetrically) that only the crypto-module in the customer system is capable of decrypting this information.
  • the customer enters information (e.g. goods/product, price, supplier/seller, date, etc.) into the crypto-module.
  • information e.g. goods/product, price, supplier/seller, date, etc.
  • the crypto-module generates a bash value, among other things, on the basis of the purchase data, the random number, the Pay ID PID (and optionally additional information).
  • the customer system generates a so-called PayMark, that is to say, a character string with crypto-information containing, among other things, the following information: the purchase data in plain text, the temporally stored CryptoString and the generated hash value.
  • This PayMark can be transmitted, for example, electronically to the seller (for example, with an e-mail or on-line via the World-Wide Web), but it can also be transmitted to the seller via other data carriers or else printed out on paper.
  • the crypto-module digitally signs the PayMark with all of the security-relevant information with its own private key and stores it in a journal file in the customer system.
  • the seller receives the PayMark as a monetary-value confirmation for a payment and submits it to the e-Commerce Center for purposes of verification of its validity and for effectuating a payment to him/her.
  • the PayMark it is also possible for the PayMark to be transmitted directly to the e-Commerce Center, bypassing the seller.
  • the e-Commerce Center now generates a hash value, among other things, on the basis of the transmission-specific data, the random number decrypted from the CryptoString and the Pay ID PID (and optionally additional information).
  • the e-Commerce Center issues and sends the seller a receipt consisting of the purchase data, the validity confirmation of the PayMark and the confirmation of the payment instruction.
  • the payment transaction to the seller is effectuated, optionally with a time delay.
  • the produced PayMarks are either charged to the customer ahead of time (loading amount by means of the debit method) or retrospectively on the basis of the journal data. Subsequently, it is possible to continue again with Item 1, that is to say, with the preparation of a new random number X and a new Pay ID PID.

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Meter Arrangements (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Coin-Freed Apparatuses For Hiring Articles (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
US10/258,226 2000-04-27 2002-11-26 Method, according to which a customer accesses monetary-value data from a charging point Abandoned US20040111380A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE10020565A DE10020565A1 (de) 2000-04-27 2000-04-27 Verfahren, bei dem ein Kunde eine geldwerte Information aus einer Ladestelle abruft
DE10020565.8 2000-04-27

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
PCT/DE2001/001552 A-371-Of-International WO2001082148A1 (de) 2000-04-27 2001-04-24 Verfahren, bei dem ein kunde eine geldwerte information aus einer ladestelle abruft

Publications (2)

Publication Number Publication Date
US20030135473A1 US20030135473A1 (en) 2003-07-17
US20040111380A2 true US20040111380A2 (en) 2004-06-10

Family

ID=7640061

Family Applications (1)

Application Number Title Priority Date Filing Date
US10/258,226 Abandoned US20040111380A2 (en) 2000-04-27 2002-11-26 Method, according to which a customer accesses monetary-value data from a charging point

Country Status (11)

Country Link
US (1) US20040111380A2 (de)
EP (1) EP1279132B1 (de)
AT (1) ATE270446T1 (de)
AU (1) AU2001262043A1 (de)
CA (1) CA2428674A1 (de)
DE (2) DE10020565A1 (de)
DK (1) DK1279132T3 (de)
ES (1) ES2223851T3 (de)
PT (1) PT1279132E (de)
TR (1) TR200402522T4 (de)
WO (1) WO2001082148A1 (de)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110119144A1 (en) * 2009-11-17 2011-05-19 Qualcomm Incorporated Authorized based receipt of wireless power
US10496985B2 (en) 2012-10-15 2019-12-03 Giesecke+Devrient Mobile Security Gmbh Loading and disbursement of an electronic amount of money

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7308424B2 (en) * 2001-03-12 2007-12-11 Ricoh Company, Ltd. Electronic commerce system and electronic commerce method
EP1775677A1 (de) 2005-10-07 2007-04-18 Deutsche Post AG Warenauslieferungssystem, Verfahren zur Auslieferung von Waren, Versandkomponente und Ausgabestelle für Waren
CN102201922B (zh) * 2010-03-22 2013-11-13 阿里巴巴集团控股有限公司 一种数据计费方法和相关装置

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4630201A (en) * 1984-02-14 1986-12-16 International Security Note & Computer Corporation On-line and off-line transaction security system using a code generated from a transaction parameter and a random number
US4800590A (en) * 1985-01-14 1989-01-24 Willis E. Higgins Computer key and computer lock system
US5440634A (en) * 1991-10-16 1995-08-08 Jonhig Limited Value transfer system
US5987140A (en) * 1996-04-26 1999-11-16 Verifone, Inc. System, method and article of manufacture for secure network electronic payment and credit collection
US6047268A (en) * 1997-11-04 2000-04-04 A.T.&T. Corporation Method and apparatus for billing for transactions conducted over the internet
US6560581B1 (en) * 1995-06-29 2003-05-06 Visa International Service Association System and method for secure electronic commerce transaction
US7117365B1 (en) * 1999-02-16 2006-10-03 Fraunhofer-Gesellschaft Zur Foerderung Der Angewandten Forschung E.V. Method and device for generating a data stream and method and device for playing back a data stream
US7478239B1 (en) * 1994-04-28 2009-01-13 Citibank, N.A. Electronic ticket vending system

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5267314A (en) * 1992-11-17 1993-11-30 Leon Stambler Secure transaction system and method utilized therein
US5317636A (en) * 1992-12-09 1994-05-31 Arris, Inc. Method and apparatus for securing credit card transactions
US5809144A (en) * 1995-08-24 1998-09-15 Carnegie Mellon University Method and apparatus for purchasing and delivering digital goods over a network
GB9624127D0 (en) * 1996-11-20 1997-01-08 British Telecomm Transaction system
GB2338381A (en) * 1998-06-10 1999-12-15 Barclays Bank Plc Cryptographic authentication for internet using two servers

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4630201A (en) * 1984-02-14 1986-12-16 International Security Note & Computer Corporation On-line and off-line transaction security system using a code generated from a transaction parameter and a random number
US4800590A (en) * 1985-01-14 1989-01-24 Willis E. Higgins Computer key and computer lock system
US5440634A (en) * 1991-10-16 1995-08-08 Jonhig Limited Value transfer system
US7478239B1 (en) * 1994-04-28 2009-01-13 Citibank, N.A. Electronic ticket vending system
US6560581B1 (en) * 1995-06-29 2003-05-06 Visa International Service Association System and method for secure electronic commerce transaction
US5987140A (en) * 1996-04-26 1999-11-16 Verifone, Inc. System, method and article of manufacture for secure network electronic payment and credit collection
US6047268A (en) * 1997-11-04 2000-04-04 A.T.&T. Corporation Method and apparatus for billing for transactions conducted over the internet
US7117365B1 (en) * 1999-02-16 2006-10-03 Fraunhofer-Gesellschaft Zur Foerderung Der Angewandten Forschung E.V. Method and device for generating a data stream and method and device for playing back a data stream

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110119144A1 (en) * 2009-11-17 2011-05-19 Qualcomm Incorporated Authorized based receipt of wireless power
US10496985B2 (en) 2012-10-15 2019-12-03 Giesecke+Devrient Mobile Security Gmbh Loading and disbursement of an electronic amount of money

Also Published As

Publication number Publication date
ES2223851T3 (es) 2005-03-01
AU2001262043A1 (en) 2001-11-07
CA2428674A1 (en) 2001-11-01
EP1279132A1 (de) 2003-01-29
US20030135473A1 (en) 2003-07-17
DK1279132T3 (da) 2004-10-25
DE10020565A1 (de) 2001-10-31
ATE270446T1 (de) 2004-07-15
PT1279132E (pt) 2004-11-30
TR200402522T4 (tr) 2004-12-21
EP1279132B1 (de) 2004-06-30
WO2001082148A1 (de) 2001-11-01
DE50102745D1 (de) 2004-08-05

Similar Documents

Publication Publication Date Title
US8171297B2 (en) System and method using information based indicia for securing and authenticating transactions
US6000832A (en) Electronic online commerce card with customer generated transaction proxy number for online transactions
US7058611B2 (en) Method and system for conducting secure electronic commerce transactions with authorization request data loop-back
US20020161709A1 (en) Server-side commerce for deliver-then-pay content delivery
US20010032878A1 (en) Method and system for making anonymous electronic payments on the world wide web
WO2018150275A2 (en) Splitting digital promises recorded in a blockchain
KR20050042694A (ko) 보안토큰을 이용한 전자거래방법 및 그 시스템
JP2003531447A (ja) バーチャル安全のための方法およびシステム
WO2003065164A2 (en) System and method for conducting secure payment transaction
CA2669320A1 (en) Secure financial transactions
US20050131834A1 (en) E-commerce by check
US7107242B1 (en) Electronic transaction security method
WO2000067143A2 (en) Transaction method and system for data networks
JPH11175607A (ja) 書類送付システムおよび方法
WO2001035570A1 (en) Payment method and system for online commerce
US20040111380A2 (en) Method, according to which a customer accesses monetary-value data from a charging point
WO2001011515A2 (en) Method and system for making anonymous electronic payments on the world wide web
GB2370475A (en) Secure online transaction where a buyer sends some information direct to a bank and some via a vendor
AU2002254513B8 (en) System and method for conducting secure payment transactions
AU2002254513A1 (en) System and method for conducting secure payment transactions
AU2020103518A4 (en) ISMA- Account Management System: Intelligent Security Module for an Advanced Account Management System
US20020035694A1 (en) Method and apparatus for anonymous remote transactions
JP2000076330A (ja) 書類送付システムおよび方法
JP2002358471A (ja) 電子決済システム、領収書、領収書発行装置、監査装置、及び、電子透かし蓄積管理装置
Sharma An evaluation of e-payment systems and their application in mobile commerce.

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION